cidaas-javascript-sdk 4.2.4 → 4.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/CHANGELOG.md +41 -2
  2. package/README.md +9 -6
  3. package/dist/authentication/{index.d.ts → Authentication.d.ts} +2 -2
  4. package/dist/authentication/{index.js → Authentication.js} +2 -9
  5. package/dist/common/Common.model.d.ts +41 -0
  6. package/dist/common/Common.model.js +26 -0
  7. package/dist/{web-auth → common}/Helper.d.ts +6 -6
  8. package/dist/{web-auth → common}/Helper.js +10 -10
  9. package/dist/common/JwtHelper.d.ts +8 -0
  10. package/dist/{web-auth → common}/JwtHelper.js +8 -8
  11. package/dist/common/User.model.d.ts +134 -0
  12. package/dist/common/User.model.js +2 -0
  13. package/dist/consent-service/ConsentService.d.ts +97 -0
  14. package/dist/consent-service/ConsentService.js +127 -0
  15. package/dist/consent-service/ConsentService.model.d.ts +102 -0
  16. package/dist/consent-service/ConsentService.model.js +2 -0
  17. package/dist/index.d.ts +1 -1
  18. package/dist/index.js +1 -1
  19. package/dist/login-service/LoginService.d.ts +143 -0
  20. package/dist/login-service/LoginService.js +247 -0
  21. package/dist/login-service/LoginService.model.d.ts +142 -0
  22. package/dist/login-service/LoginService.model.js +13 -0
  23. package/dist/token-service/TokenService.d.ts +139 -0
  24. package/dist/token-service/TokenService.js +242 -0
  25. package/dist/token-service/TokenService.model.d.ts +149 -0
  26. package/dist/token-service/TokenService.model.js +43 -0
  27. package/dist/user-service/UserService.d.ts +317 -0
  28. package/dist/user-service/UserService.js +451 -0
  29. package/dist/user-service/UserService.model.d.ts +142 -0
  30. package/dist/user-service/UserService.model.js +10 -0
  31. package/dist/verification-service/VerificationService.d.ts +219 -0
  32. package/dist/verification-service/VerificationService.js +288 -0
  33. package/dist/verification-service/VerificationService.model.d.ts +158 -0
  34. package/dist/verification-service/VerificationService.model.js +2 -0
  35. package/dist/web-auth/WebAuth.d.ts +138 -178
  36. package/dist/web-auth/WebAuth.js +183 -177
  37. package/dist/web-auth/webauth.model.d.ts +66 -0
  38. package/dist/web-auth/webauth.model.js +2 -0
  39. package/package.json +2 -2
  40. package/dist/web-auth/ConsentService.d.ts +0 -123
  41. package/dist/web-auth/ConsentService.js +0 -136
  42. package/dist/web-auth/Entities.d.ts +0 -516
  43. package/dist/web-auth/Entities.js +0 -69
  44. package/dist/web-auth/JwtHelper.d.ts +0 -7
  45. package/dist/web-auth/LoginService.d.ts +0 -165
  46. package/dist/web-auth/LoginService.js +0 -246
  47. package/dist/web-auth/TokenService.d.ts +0 -143
  48. package/dist/web-auth/TokenService.js +0 -249
  49. package/dist/web-auth/UserService.d.ts +0 -345
  50. package/dist/web-auth/UserService.js +0 -471
  51. package/dist/web-auth/VerificationService.d.ts +0 -224
  52. package/dist/web-auth/VerificationService.js +0 -278
  53. /package/dist/authentication/{authentication.model.d.ts → Authentication.model.d.ts} +0 -0
  54. /package/dist/authentication/{authentication.model.js → Authentication.model.js} +0 -0
@@ -1,5 +1,14 @@
1
- import { OidcSettings, LoginRedirectOptions, LogoutRedirectOptions, PopupSignInOptions, PopupSignOutOptions, SilentSignInOptions, LoginRequestOptions, User, LogoutResponse } from '../authentication';
2
- import { AccessTokenRequest, TokenIntrospectionEntity, UserEntity, ResetPasswordEntity, IConfiguredListRequestEntity, IInitVerificationAuthenticationRequestEntity, FindUserEntity, IUserEntity, IEnrollVerificationSetupRequestEntity, IUserLinkEntity, ChangePasswordEntity, IConsentAcceptEntity, IAuthVerificationAuthenticationRequestEntity, LoginFormRequestEntity, AccountVerificationRequestEntity, ValidateResetPasswordEntity, AcceptResetPasswordEntity, PhysicalVerificationLoginRequest, IChangePasswordEntity, IUserActivityPayloadEntity } from "./Entities";
1
+ import { GetAccessTokenRequest, RenewTokenRequest, TokenIntrospectionRequest } from '../token-service/TokenService.model';
2
+ import { AcceptClaimConsentRequest, AcceptConsentRequest, AcceptScopeConsentRequest, GetConsentDetailsRequest, GetConsentVersionDetailsRequest, RevokeClaimConsentRequest } from '../consent-service/ConsentService.model';
3
+ import { FirstTimeChangePasswordRequest, LoginAfterRegisterRequest, LoginWithCredentialsRequest, MfaContinueRequest, PasswordlessLoginRequest, ProgressiveRegistrationHeader, SocialProviderPathParameter, SocialProviderQueryParameter } from '../login-service/LoginService.model';
4
+ import { LoginPrecheckRequest } from '../common/Common.model';
5
+ import { CidaasUser } from '../common/User.model';
6
+ import { ChangePasswordRequest, CompleteLinkAccountRequest, DeduplicationLoginRequest, DeleteUserAccountRequest, GetDeduplicationDetailsRequest, GetInviteUserDetailsRequest, GetUserProfileRequest, HandleResetPasswordRequest, InitiateLinkAccountRequest, InitiateResetPasswordRequest, RegisterDeduplicationRequest, RegisterRequest, ResetPasswordRequest, UserCheckExistsRequest, getCommunicationStatusRequest } from '../user-service/UserService.model';
7
+ import { HTTPRequestHeader } from "../common/Common.model";
8
+ import { User } from "oidc-client-ts";
9
+ import { OidcSettings, LoginRedirectOptions, PopupSignInOptions, SilentSignInOptions, LogoutRedirectOptions, PopupSignOutOptions, LogoutResponse, LoginRequestOptions } from "../authentication/Authentication.model";
10
+ import { AuthenticateMFARequest, CancelMFARequest, CheckVerificationTypeConfiguredRequest, ConfigureFriendlyNameRequest, ConfigureVerificationRequest, EnrollVerificationRequest, GetMFAListRequest, InitiateAccountVerificationRequest, InitiateEnrollmentRequest, InitiateMFARequest, InitiateVerificationRequest, VerifyAccountRequest } from "../verification-service/VerificationService.model";
11
+ import { DeleteDeviceRequest, GetClientInfoRequest, GetRegistrationSetupRequest, GetUserActivitiesRequest, LogoutUserRequest, UpdateProfileImageRequest, UserActionOnEnrollmentRequest, GetRequestIdRequest } from "./webauth.model";
3
12
  export declare const createPreloginWebauth: (authority: string) => WebAuth;
4
13
  export declare class WebAuth {
5
14
  constructor(settings: OidcSettings);
@@ -105,14 +114,19 @@ export declare class WebAuth {
105
114
  * Each and every proccesses starts with requestId, it is an entry point to login or register. For getting the requestId, call **getRequestId()**.
106
115
  * @example
107
116
  * ```js
108
- * cidaas.getRequestId().then(function (response) {
117
+ * const option: GetRequestIdRequest = {
118
+ * 'client_id': 'your client id',
119
+ * 'redirect_uri': 'your redirect url',
120
+ * 'scope': 'your scopes',
121
+ * }
122
+ * cidaas.getRequestId(option).then(function (response) {
109
123
  * // the response will give you request id.
110
124
  * }).catch(function(ex) {
111
125
  * // your failure code here
112
126
  * });
113
127
  * ```
114
128
  */
115
- getRequestId(): Promise<unknown>;
129
+ getRequestId(option?: GetRequestIdRequest): Promise<any>;
116
130
  /**
117
131
  * To get the tenant basic information, call **getTenantInfo()**. This will return the basic tenant details such as tenant name and allowed login with types (Email, Mobile, Username).
118
132
  * @example
@@ -124,7 +138,7 @@ export declare class WebAuth {
124
138
  * });
125
139
  * ```
126
140
  */
127
- getTenantInfo(): Promise<unknown>;
141
+ getTenantInfo(): Promise<any>;
128
142
  /**
129
143
  * To logout the user by using cidaas internal api, call **logoutUser()**.
130
144
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/3b5ce6a54bf29-logout for more details.
@@ -135,9 +149,7 @@ export declare class WebAuth {
135
149
  * });
136
150
  * ```
137
151
  */
138
- logoutUser(options: {
139
- access_token: string;
140
- }): void;
152
+ logoutUser(options: LogoutUserRequest): void;
141
153
  /**
142
154
  * To get the client basic information, call **getClientInfo()**. This will return the basic client details such as client name and its details.
143
155
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/dc8a6cfb28abb-public-page-information for more details.
@@ -152,15 +164,13 @@ export declare class WebAuth {
152
164
  * });
153
165
  * ```
154
166
  */
155
- getClientInfo(options: {
156
- requestId: string;
157
- }): Promise<unknown>;
167
+ getClientInfo(options: GetClientInfoRequest): Promise<any>;
158
168
  /**
159
169
  * To get all devices information associated to the client, call **getDevicesInfo()**
160
170
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/2a2feed70303c-get-device-by-user for more details.
161
171
  * @example
162
172
  * ```js
163
- * const options = {};
173
+ * const options = null; // the payload is deprecated and will be removed in the next major release
164
174
  * const accessToken = 'your access token';
165
175
  * cidaas.getDevicesInfo(options, accessToken).then(function (resp) {
166
176
  * // the response will give you devices informations.
@@ -169,7 +179,7 @@ export declare class WebAuth {
169
179
  * });
170
180
  * ```
171
181
  */
172
- getDevicesInfo(options: any, accessToken: string): Promise<unknown>;
182
+ getDevicesInfo(options: void, accessToken: string): Promise<any>;
173
183
  /**
174
184
  * To delete device associated to the client, call **deleteDevice()**
175
185
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/3d44ad903d6e8-logout-the-user-for-a-device for more details.
@@ -186,10 +196,7 @@ export declare class WebAuth {
186
196
  * });
187
197
  * ```
188
198
  */
189
- deleteDevice(options: {
190
- device_id: string;
191
- userAgent?: string;
192
- }, accessToken: string): Promise<unknown>;
199
+ deleteDevice(options: DeleteDeviceRequest, accessToken: string): Promise<any>;
193
200
  /**
194
201
  * To handle registration, first you need the registration fields. To get the registration fields, call **getRegistrationSetup()**. This will return the fields that has to be needed while registration.
195
202
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/4eae72956f65a-registration-field-setup for more details.
@@ -205,10 +212,7 @@ export declare class WebAuth {
205
212
  * });
206
213
  * ```
207
214
  */
208
- getRegistrationSetup(options: {
209
- acceptlanguage?: string;
210
- requestId: string;
211
- }): Promise<unknown>;
215
+ getRegistrationSetup(options: GetRegistrationSetupRequest): Promise<any>;
212
216
  /**
213
217
  * to generate device info, call **createDeviceInfo()**.
214
218
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/9b5a892afaf0b-create-device-info for more details.
@@ -221,268 +225,211 @@ export declare class WebAuth {
221
225
  * });
222
226
  * ```
223
227
  */
224
- createDeviceInfo(): Promise<unknown>;
228
+ createDeviceInfo(): Promise<any>;
225
229
  /**
226
230
  * get the user profile information
227
231
  * @param options
228
232
  * @returns
229
233
  */
230
- getUserProfile(options: {
231
- access_token: string;
232
- }): Promise<unknown>;
234
+ getUserProfile(options: GetUserProfileRequest): Promise<any>;
233
235
  /**
234
236
  * renew token using refresh token
235
237
  * @param options
236
238
  * @returns
237
239
  */
238
- renewToken(options: AccessTokenRequest): Promise<unknown>;
240
+ renewToken(options: RenewTokenRequest): Promise<any>;
239
241
  /**
240
242
  * get access token from code
241
243
  * @param options
242
244
  * @returns
243
245
  */
244
- getAccessToken(options: AccessTokenRequest): Promise<unknown>;
246
+ getAccessToken(options: GetAccessTokenRequest): Promise<any>;
245
247
  /**
246
248
  * validate access token
247
249
  * @param options
248
250
  * @returns
249
251
  */
250
- validateAccessToken(options: TokenIntrospectionEntity): Promise<unknown>;
252
+ validateAccessToken(options: TokenIntrospectionRequest): Promise<any>;
251
253
  /**
252
254
  * login with username and password
253
255
  * @param options
254
256
  */
255
- loginWithCredentials(options: LoginFormRequestEntity): void;
257
+ loginWithCredentials(options: LoginWithCredentialsRequest): void;
256
258
  /**
257
259
  * login with social
258
260
  * @param options
259
261
  * @param queryParams
260
262
  */
261
- loginWithSocial(options: {
262
- provider: string;
263
- requestId: string;
264
- }, queryParams: {
265
- dc: string;
266
- device_fp: string;
267
- }): void;
263
+ loginWithSocial(options: SocialProviderPathParameter, queryParams?: SocialProviderQueryParameter): void;
268
264
  /**
269
265
  * register with social
270
266
  * @param options
271
267
  * @param queryParams
272
268
  */
273
- registerWithSocial(options: {
274
- provider: string;
275
- requestId: string;
276
- }, queryParams: {
277
- dc: string;
278
- device_fp: string;
279
- }): void;
269
+ registerWithSocial(options: SocialProviderPathParameter, queryParams?: SocialProviderQueryParameter): void;
280
270
  /**
281
271
  * register user
282
272
  * @param options
283
273
  * @param headers
284
274
  * @returns
285
275
  */
286
- register(options: UserEntity, headers: {
287
- requestId: string;
288
- captcha?: string;
289
- acceptlanguage?: string;
290
- bot_captcha_response?: string;
291
- trackId?: string;
292
- }): Promise<unknown>;
276
+ register(options: RegisterRequest, headers: HTTPRequestHeader): Promise<any>;
293
277
  /**
294
278
  * get invite info
295
279
  * @param options
280
+ * @param headers
296
281
  * @returns
297
282
  */
298
- getInviteUserDetails(options: {
299
- invite_id: string;
300
- callLatestAPI?: boolean;
301
- }): Promise<unknown>;
283
+ getInviteUserDetails(options: GetInviteUserDetailsRequest, headers?: HTTPRequestHeader): Promise<any>;
302
284
  /**
303
285
  * get Communication status
304
286
  * @param options
287
+ * @param headers
305
288
  * @returns
306
289
  */
307
- getCommunicationStatus(options: {
308
- sub: string;
309
- }, headers: {
310
- requestId: string;
311
- }): Promise<unknown>;
290
+ getCommunicationStatus(options: getCommunicationStatusRequest, headers?: HTTPRequestHeader): Promise<any>;
312
291
  /**
313
292
  * initiate verification
314
293
  * @param options
315
294
  * @returns
316
295
  */
317
- initiateAccountVerification(options: AccountVerificationRequestEntity): void;
296
+ initiateAccountVerification(options: InitiateAccountVerificationRequest): void;
318
297
  /**
319
298
  * verify account
320
299
  * @param options
300
+ * @param headers
321
301
  * @returns
322
302
  */
323
- verifyAccount(options: {
324
- accvid: string;
325
- code: string;
326
- }): Promise<unknown>;
303
+ verifyAccount(options: VerifyAccountRequest, headers?: HTTPRequestHeader): Promise<any>;
327
304
  /**
328
305
  * initiate reset password
329
306
  * @param options
307
+ * @param headers
330
308
  * @returns
331
309
  */
332
- initiateResetPassword(options: ResetPasswordEntity): Promise<unknown>;
310
+ initiateResetPassword(options: InitiateResetPasswordRequest, headers?: HTTPRequestHeader): Promise<any>;
333
311
  /**
334
312
  * handle reset password
335
313
  * @param options
314
+ * @param handleResponseAsJson
315
+ * @param headers
336
316
  */
337
- handleResetPassword(options: ValidateResetPasswordEntity): Promise<unknown>;
317
+ handleResetPassword(options: HandleResetPasswordRequest, handleResponseAsJson?: boolean, headers?: HTTPRequestHeader): Promise<any>;
338
318
  /**
339
319
  * reset password
340
320
  * @param options
321
+ * @param handleResponseAsJson
322
+ * @param headers
341
323
  */
342
- resetPassword(options: AcceptResetPasswordEntity): Promise<unknown>;
324
+ resetPassword(options: ResetPasswordRequest, handleResponseAsJson?: boolean, headers?: HTTPRequestHeader): Promise<any>;
343
325
  /**
344
326
  * get mfa list
345
327
  * @param options
328
+ * @param headers
346
329
  * @returns
347
330
  */
348
- getMFAList(options: IConfiguredListRequestEntity): Promise<unknown>;
331
+ getMFAList(options: GetMFAListRequest, headers?: HTTPRequestHeader): Promise<any>;
349
332
  /**
350
333
  * cancel mfa
351
334
  * @param options
335
+ * @param headers
352
336
  * @returns
353
337
  */
354
- cancelMFA(options: {
355
- exchange_id: string;
356
- reason: string;
357
- type: string;
358
- }): Promise<unknown>;
338
+ cancelMFA(options: CancelMFARequest, headers?: HTTPRequestHeader): Promise<any>;
359
339
  /**
360
340
  * passwordless login
361
341
  * @param options
362
342
  */
363
- passwordlessLogin(options: PhysicalVerificationLoginRequest): void;
343
+ passwordlessLogin(options: PasswordlessLoginRequest): void;
364
344
  /**
365
345
  * get user consent details
366
346
  * @param options
367
347
  * @returns
368
348
  */
369
- getConsentDetails(options: {
370
- consent_id: string;
371
- consent_version_id: string;
372
- sub: string;
373
- }): Promise<unknown>;
349
+ getConsentDetails(options: GetConsentDetailsRequest, headers?: HTTPRequestHeader): Promise<any>;
374
350
  /**
375
351
  * accept consent
376
352
  * @param options
353
+ * @param headers
377
354
  * @returns
378
355
  */
379
- acceptConsent(options: IConsentAcceptEntity): Promise<unknown>;
356
+ acceptConsent(options: AcceptConsentRequest, headers?: HTTPRequestHeader): Promise<any>;
380
357
  /**
381
358
  * get scope consent details
382
359
  * @param options
360
+ * @param headers
383
361
  * @returns
384
362
  */
385
- loginPrecheck(options: {
386
- track_id: string;
387
- locale: string;
388
- }): Promise<unknown>;
363
+ loginPrecheck(options: LoginPrecheckRequest, headers?: HTTPRequestHeader): Promise<any>;
389
364
  /**
390
365
  * get scope consent version details
391
366
  * @param options
367
+ * @param headers
392
368
  * @returns
393
369
  */
394
- getConsentVersionDetails(options: {
395
- consentid: string;
396
- locale: string;
397
- access_token: string;
398
- }): Promise<unknown>;
370
+ getConsentVersionDetails(options: GetConsentVersionDetailsRequest, headers?: HTTPRequestHeader): Promise<any>;
399
371
  /**
400
372
  * accept scope Consent
401
373
  * @param options
374
+ * @param headers
402
375
  * @returns
403
376
  */
404
- acceptScopeConsent(options: {
405
- client_id: string;
406
- sub: string;
407
- scopes: string[];
408
- }): Promise<unknown>;
377
+ acceptScopeConsent(options: AcceptScopeConsentRequest, headers?: HTTPRequestHeader): Promise<any>;
409
378
  /**
410
379
  * accept claim Consent
411
380
  * @param options
381
+ * @param headers
412
382
  * @returns
413
383
  */
414
- acceptClaimConsent(options: {
415
- client_id: string;
416
- sub: string;
417
- accepted_claims: string[];
418
- }): Promise<unknown>;
384
+ acceptClaimConsent(options: AcceptClaimConsentRequest, headers?: HTTPRequestHeader): Promise<any>;
419
385
  /**
420
386
  * revoke claim Consent
421
387
  * @param options
422
388
  * @returns
423
389
  */
424
- revokeClaimConsent(options: {
425
- client_id: string;
426
- sub: string;
427
- revoked_claims: string[];
428
- }): Promise<unknown>;
390
+ revokeClaimConsent(options: RevokeClaimConsentRequest): Promise<any>;
429
391
  /**
430
392
  * get Deduplication details
431
393
  * @param options
394
+ * @param headers
432
395
  * @returns
433
396
  */
434
- getDeduplicationDetails(options: {
435
- trackId: string;
436
- }): Promise<unknown>;
397
+ getDeduplicationDetails(options: GetDeduplicationDetailsRequest, headers?: HTTPRequestHeader): Promise<any>;
437
398
  /**
438
399
  * deduplication login
439
400
  * @param options
440
401
  */
441
- deduplicationLogin(options: {
442
- trackId: string;
443
- requestId: string;
444
- sub: string;
445
- }): void;
402
+ deduplicationLogin(options: DeduplicationLoginRequest): void;
446
403
  /**
447
404
  * register Deduplication
448
405
  * @param options
406
+ * @param headers
449
407
  * @returns
450
408
  */
451
- registerDeduplication(options: {
452
- trackId: string;
453
- }): Promise<unknown>;
409
+ registerDeduplication(options: RegisterDeduplicationRequest, headers?: HTTPRequestHeader): Promise<any>;
454
410
  /**
455
- * accepts any as the request
456
411
  * consent continue login
457
412
  * @param options
458
413
  */
459
- consentContinue(options: {
460
- client_id: string;
461
- consent_refs: string[];
462
- sub: string;
463
- scopes: string[];
464
- matcher: any;
465
- track_id: string;
466
- }): void;
414
+ consentContinue(options: LoginPrecheckRequest): void;
467
415
  /**
468
416
  * mfa continue login
417
+ * options: PhysicalVerificationLoginRequest is not needed anymore. It is now DEPRECATED and will be removed in the next major release
469
418
  * @param options
470
419
  */
471
- mfaContinue(options: PhysicalVerificationLoginRequest & {
472
- track_id: string;
473
- }): void;
420
+ mfaContinue(options: MfaContinueRequest): void;
474
421
  /**
475
422
  * change password continue
476
423
  * @param options
477
424
  */
478
- firstTimeChangePassword(options: IChangePasswordEntity): void;
425
+ firstTimeChangePassword(options: FirstTimeChangePasswordRequest): void;
479
426
  /**
480
427
  * change password
481
428
  * @param options
482
429
  * @param access_token
483
430
  * @returns
484
431
  */
485
- changePassword(options: ChangePasswordEntity, access_token: string): Promise<unknown>;
432
+ changePassword(options: ChangePasswordRequest, access_token: string): Promise<any>;
486
433
  /**
487
434
  * update profile
488
435
  * @param options
@@ -490,7 +437,7 @@ export declare class WebAuth {
490
437
  * @param sub
491
438
  * @returns
492
439
  */
493
- updateProfile(options: UserEntity, access_token: string, sub: string): Promise<unknown>;
440
+ updateProfile(options: CidaasUser, access_token: string, sub: string): Promise<any>;
494
441
  /**
495
442
  * To get user activities, call **getUserActivities()**.
496
443
  * Please refer to the api document https://docs.cidaas.com/docs/cidaas-iam/346141453781e-get-user-activities for more details.
@@ -511,43 +458,53 @@ export declare class WebAuth {
511
458
  * });
512
459
  * ```
513
460
  */
514
- getUserActivities(options: IUserActivityPayloadEntity, accessToken: string): Promise<unknown>;
461
+ getUserActivities(options: GetUserActivitiesRequest, accessToken: string): Promise<any>;
462
+ /**
463
+ * To run predefined action after enrollment, call userActionOnEnrollment()
464
+ * @param options
465
+ * @param trackId
466
+ * @example
467
+ * ```js
468
+ * const options = {
469
+ * action: 'predefined action'
470
+ * };
471
+ * cidaas.userActionOnEnrollment(options, 'trackId');
472
+ */
473
+ userActionOnEnrollment(options: UserActionOnEnrollmentRequest, trackId: string): Promise<any>;
515
474
  /**
516
475
  * @param access_token
476
+ * @param headers
517
477
  * @returns
518
478
  */
519
- getAllVerificationList(access_token: string): Promise<unknown>;
479
+ getAllVerificationList(access_token: string, headers?: HTTPRequestHeader): Promise<any>;
520
480
  /**
521
481
  * initiate link accoount
522
482
  * @param options
523
483
  * @param access_token
524
484
  * @returns
525
485
  */
526
- initiateLinkAccount(options: IUserLinkEntity, access_token: string): Promise<unknown>;
486
+ initiateLinkAccount(options: InitiateLinkAccountRequest, access_token: string): Promise<any>;
527
487
  /**
528
488
  * complete link accoount
529
489
  * @param options
530
490
  * @param access_token
531
491
  * @returns
532
492
  */
533
- completeLinkAccount(options: {
534
- code?: string;
535
- link_request_id?: string;
536
- }, access_token: string): Promise<unknown>;
493
+ completeLinkAccount(options: CompleteLinkAccountRequest, access_token: string): Promise<any>;
537
494
  /**
538
495
  * get linked users
539
496
  * @param access_token
540
497
  * @param sub
541
498
  * @returns
542
499
  */
543
- getLinkedUsers(access_token: string, sub: string): Promise<unknown>;
500
+ getLinkedUsers(access_token: string, sub: string): Promise<any>;
544
501
  /**
545
502
  * unlink accoount
546
503
  * @param access_token
547
504
  * @param identityId
548
505
  * @returns
549
506
  */
550
- unlinkAccount(access_token: string, identityId: string): Promise<unknown>;
507
+ unlinkAccount(access_token: string, identityId: string): Promise<any>;
551
508
  /**
552
509
  * To change profile image, call **updateProfileImage()**.
553
510
  * @example
@@ -565,56 +522,41 @@ export declare class WebAuth {
565
522
  * });
566
523
  * ```
567
524
  */
568
- updateProfileImage(options: {
569
- image_key: string;
570
- photo: any;
571
- filename: string;
572
- }, access_token: string): Promise<unknown>;
525
+ updateProfileImage(options: UpdateProfileImageRequest, access_token: string): Promise<any>;
573
526
  /**
574
527
  * enrollVerification
575
528
  * @param options
576
529
  * @returns
577
530
  */
578
- initiateEnrollment(options: {
579
- verification_type: string;
580
- deviceInfo?: {
581
- deviceId: string;
582
- location: {
583
- lat: string;
584
- lon: string;
585
- };
586
- };
587
- }, accessToken: string): Promise<unknown>;
531
+ initiateEnrollment(options: InitiateEnrollmentRequest, accessToken: string): Promise<any>;
588
532
  /**
589
533
  * update the status of notification
590
534
  * @param status_id
535
+ * @param headers
591
536
  * @returns
592
537
  */
593
- getEnrollmentStatus(status_id: string, accessToken: string): Promise<unknown>;
538
+ getEnrollmentStatus(status_id: string, accessToken: string, headers?: HTTPRequestHeader): Promise<any>;
594
539
  /**
595
540
  * enrollVerification
596
541
  * @param options
597
542
  * @returns
598
543
  */
599
- enrollVerification(options: IEnrollVerificationSetupRequestEntity): Promise<unknown>;
544
+ enrollVerification(options: EnrollVerificationRequest): Promise<any>;
600
545
  /**
601
546
  * checkVerificationTypeConfigured
602
547
  * @param options
603
548
  * @returns
604
549
  */
605
- checkVerificationTypeConfigured(options: IConfiguredListRequestEntity): Promise<unknown>;
550
+ checkVerificationTypeConfigured(options: CheckVerificationTypeConfiguredRequest): Promise<any>;
606
551
  /**
607
552
  * deleteUserAccount
608
553
  * @param options
609
554
  * @returns
610
555
  */
611
- deleteUserAccount(options: {
612
- access_token: string;
613
- sub: string;
614
- }): Promise<unknown>;
556
+ deleteUserAccount(options: DeleteUserAccountRequest): Promise<any>;
615
557
  /**
616
558
  * getMissingFields
617
- * @param trackId - required. If only trackId is given, it will get missing fields from cidaas after succesfull registration using default provider
559
+ * @param trackId - required. If only trackId is given, it will get missing fields from cidaas after succesful registration using default provider
618
560
  * @param useSocialProvider - optional. If given, it will get missing fields from social provider after successful registration using social provider
619
561
  *
620
562
  * @example
@@ -633,32 +575,23 @@ export declare class WebAuth {
633
575
  */
634
576
  getMissingFields(trackId: string, useSocialProvider?: {
635
577
  requestId: string;
636
- }): Promise<unknown>;
578
+ }, headers?: HTTPRequestHeader): Promise<any>;
637
579
  /**
638
580
  * progressiveRegistration
639
581
  * @param options
640
582
  * @param headers
641
583
  * @returns
642
584
  */
643
- progressiveRegistration(options: IUserEntity, headers: {
644
- requestId: string;
645
- trackId: string;
646
- acceptlanguage: string;
647
- }): Promise<unknown>;
585
+ progressiveRegistration(options: CidaasUser, headers: ProgressiveRegistrationHeader): Promise<any>;
648
586
  /**
649
587
  * loginAfterRegister
650
588
  * @param options
651
589
  */
652
- loginAfterRegister(options: {
653
- device_id: string;
654
- dc?: string;
655
- rememberMe: boolean;
656
- trackId: string;
657
- }): void;
590
+ loginAfterRegister(options: LoginAfterRegisterRequest): void;
658
591
  /**
659
592
  * device code flow - initiate
660
593
  */
661
- initiateDeviceCode(clientId?: string): Promise<unknown>;
594
+ initiateDeviceCode(clientId?: string): Promise<any>;
662
595
  /**
663
596
  * device code flow - verify
664
597
  * @param code
@@ -667,9 +600,10 @@ export declare class WebAuth {
667
600
  /**
668
601
  * check if an user exists
669
602
  * @param options
603
+ * @param headers
670
604
  * @returns
671
605
  */
672
- userCheckExists(options: FindUserEntity): Promise<unknown>;
606
+ userCheckExists(options: UserCheckExistsRequest, headers?: HTTPRequestHeader): Promise<any>;
673
607
  /**
674
608
  * To set accept language
675
609
  * @param acceptLanguage
@@ -678,15 +612,41 @@ export declare class WebAuth {
678
612
  /**
679
613
  * initiate mfa
680
614
  * @param options
615
+ * @param headers
681
616
  * @returns
682
617
  */
683
- initiateMFA(options: IInitVerificationAuthenticationRequestEntity, accessToken?: string): Promise<unknown>;
618
+ initiateMFA(options: InitiateMFARequest, accessToken?: string, headers?: HTTPRequestHeader): Promise<any>;
684
619
  /**
685
620
  * authenticate mfa
686
621
  * @param options
622
+ * @param headers
623
+ * @returns
624
+ */
625
+ authenticateMFA(options: AuthenticateMFARequest, headers?: HTTPRequestHeader): Promise<any>;
626
+ /**
627
+ * initiate verification
628
+ * @param options
629
+ * @returns
630
+ */
631
+ initiateVerification(options: InitiateVerificationRequest, trackId: string, method: string): Promise<any>;
632
+ /**
633
+ * configure verification
634
+ * @param options
635
+ * @returns
636
+ */
637
+ configureVerification(options: ConfigureVerificationRequest, method: string): Promise<any>;
638
+ /**
639
+ * configure friendly name
640
+ * @param options
641
+ * @returns
642
+ */
643
+ configureFriendlyName(options: ConfigureFriendlyNameRequest, trackId: string, method: string): Promise<any>;
644
+ /**
645
+ * login as guest
646
+ * @param requestId
687
647
  * @returns
688
648
  */
689
- authenticateMFA(options: IAuthVerificationAuthenticationRequestEntity): Promise<unknown>;
649
+ actionGuestLogin(requestId: string): void;
690
650
  /**
691
651
  * offline token check
692
652
  */